Riverside wren pairs jointly defend their territories against simulated intruders

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mighty Piwis Defend the Germline against Genome Intruders

Piwis are a germline-specific subclass of the Argonaute family of RNA interference (RNAi) effector proteins that are associated with a recently discovered group of small RNAs (piRNAs). Recent studies in Drosophila and zebrafish directly implicate Piwi proteins in piRNA biogenesis to maintain transposon silencing in the germline genome (Brennecke et al., 2007; Gunawardane et al., 2007; Houwing e...

متن کامل

Coral Skeletons Defend against Ultraviolet Radiation

BACKGROUND Many coral reef organisms are photosynthetic or have evolved in tight symbiosis with photosynthetic symbionts. As such, the tissues of reef organisms are often exposed to intense solar radiation in clear tropical waters and have adapted to trap and harness photosynthetically active radiation (PAR). High levels of ultraviolet radiation (UVR) associated with sunlight, however, represen...

متن کامل

Defend encryption systems against side- channel attacks

From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...

متن کامل

Divide, Denoise, and Defend against Adversarial Attacks

Deep neural networks, although shown to be a successful class of machine learning algorithms, are known to be extremely unstable to adversarial perturbations. Improving the robustness of neural networks against these attacks is important, especially for security-critical applications. To defend against such attacks, we propose dividing the input image into multiple patches, denoising each patch...

متن کامل

A New Approach to Defend against Ddos

We propose a mechanism which combines the advantage of cryptographic client puzzle and hop count filtering as a countermeasure to spoofed DOS attack. Once the communication channel has been established then HCF starts its work wherein an Internet server can easily infer the hop-count information from the Time-to-Live (TTL) field of the IP header. Using a mapping between IP addresses and their h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ethology

سال: 2017

ISSN: 0179-1613

DOI: 10.1111/eth.12694